The government enforced healthcare mandates continuously intersect with organizational formations to ensure appropriate goods or services delivered. For most affected enterprises, government interaction directly or indirectly reflects permissible activities, recognized structures, and social responsibility. In the regulatory arena, an adverse finding, coupled with prompt corrective actions can mitigate civil and criminal enforcement penalties, thereby potentially reducing or avoiding legal risks. Thus, given government-imposed healthcare mandates, organizational personnel should diligently pursue sustaining currency with applicable information security laws and regulations addressing electronic health care records.
As health organizations become more critically dependent on information systems to support care delivery, it has become increasingly evident that events in which losses of confidentiality, integrity, and availability may have a significant clinical effect. Consequently, issues arising from such information-related events are typically perceived to represent failures in the managerial obligations inherent in the duty of care.
All countries and jurisdictions will undoubtedly have case studies in which information breaches have led to misdiagnoses, deaths or protracted recoveries. Clinical governance frameworks, therefore, need to treat effective information security management as equal in importance to care treatment plans, infection management strategies and other core clinical management matters.
- Three tiers of enterprise governance examination
- Information security principles
- Information security practices
- Forces affecting electronic healthcare records protection
- Sound strategic and tactical information risk considerations
- Effectiveness measurement techniques of healthcare information protection
Areas Covered in the Session:
- ISG social responsibility
- Data protection management
- Alternative ISG frameworks
- Organizational structure considerations
- ISG effectiveness measurement
- Information security culture
- Audit committee members
- Risk management managers
- External auditors
- Internal auditors
- Chief Executive Officers
- Chief Information Officers
- Compliance managers
- Chief Information Security Officers
- Information technology professionals
- Control Self-Assessment personnel
About the Presenter:
Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the Certified Internal Controls Auditor (CICA) certificate by the Institute for Internal Controls.
Since starting his career as an information systems (IS) auditor, Robert has provided data security consulting and IS auditing services to corporations as well as other organizations; in staff through management positions. Before engaging in the practice of IS auditing and information security consulting; Robert (as a corporate employee) provided inventory as well as general accounting services to Philip Morris, USA, and general accounting services to Philadelphia National Bank (Wells Fargo). Furthermore, he has prior experience as a freelance writer of IT audit and information security training material.
Dr. Davis received recognition as an accomplished, energetic auditor, author, and speaker with a sound mix of experience and skills in monitoring and evaluating controls. Based on his accomplishments, Temple University’s Fox School of Business and Management Alumni Newsletter, as well as The Institute for Internal Controls e-newsletter featured Dr. Davis. Furthermore, he is an Advisory Board Member of The Institute for Internal Controls, the first and inaugural Temple University CISA in Residence and a founding Temple University Master of Science in IT Auditing and Cyber-Security Advisory Councilmen. Last, he accepted invitations to join Delta Mu Delta International Honor Society, the Golden Key International Honour Society, the Thomson Reuters’ Expert Witness List, the IT Governance LTD expert panel, as well as the International Association of IT Governance Standards honorary membership group.
You will receive an email with login information and handouts (presentation slides) one day before the live webcast that you can print and share to all participants at your location.
Operating System: Windows any version preferably above Windows Vista & Mac any version above OS X 10.6
Internet Speed: Preferably above 1 MBPS
Headset: Any decent headset and microphone which can be used to talk and hear clearly
Can’t Listen Live?
No problem. You can get access to On-Demand webinar. Use it as a training tool at your convenience.
For more information you can reach out to below contact:
Toll-Free No: 1-302-444-0162
Email: [email protected]
You can also use the order form for making orders. Click here to download.